RediShell Shock: Critical Vulnerability in Redis Threatens Cloud Security
Redis has patched a severe vulnerability dubbed RediShell that allows remote code execution on thousands of instances. This flaw, CVE-2025-49844, can be exploited using a crafted Lua script. Admins, patch now or risk having your data hijacked faster than you can say “free RAM cookies!”

Hot Take:
Well, it looks like Redis has caught a case of the “Oops, I left my front door open for 13 years” bug. Who knew that a use-after-free flaw from its teenage years would come back with a vengeance? Time to patch things up and make sure the only thing stored in RAM is data, not regret.
Key Points:
- Redis has a critical vulnerability, CVE-2025-49844, due to a 13-year-old use-after-free flaw.
- Exploitation allows remote code execution, affecting thousands of Redis instances.
- About 330,000 Redis instances are exposed online, with at least 60,000 open to attack without authentication.
- Admins are strongly advised to patch immediately and secure their setups.
- Previous attacks on Redis include botnets and cryptominers, highlighting its attractiveness to threat actors.
Already a member? Log in here